Professional Documents
Culture Documents
Reviewer in CCS 101
Reviewer in CCS 101
Reviewer in CCS 101
Hard Drives Built into machine. Made up of stack Ways of connecting to the Internet
of platters. Can store much more than floppy Dial-up modem – used in most homes
drives. 40 gigabytes should be minimum. Can Cable modem – uses TV cable lines
access info much faster than floppy drive. DSL – modified phone line
T1 line – used by schools, businesses, etc.
CD ROM Same as music CDs, Are read only
Can store over 650 megs . All programs now only Programs Set of instructions to the computer.
sold on CD . Make multimedia possible. Come in Programming languages.
different speeds - 20x, - 50x. System Software Run fundamental operations.
DVD ROM Digital Video Disk. Can store up to Loading and running programs. Saving and
17 G. Can store full-length movies. Can also read retrieving data. Communicating with printers,
CD-ROM disk. modems, etc.
CD-RW Allows you to write to disk. Useful for Components of System Software Components
Data backup. Storage of large files. Recording of a computer system are the primary elements
music and other multimedia file. which make the functioning of an electronic
device smooth and faster. There are five basic
DVD-RW Allows you to write to both CD and components which include:
DVD disk. Still somewhat expensive.
Storage Device Other Terms
division and other numerical based calculations
can be performed
Graphical User Interface (GUI) is an operating
system interface that uses icons, menus, and a
mouse to facilitate interaction with the system. It
was developed by Xerox Palo Alto research lab
and later popularized by the Apple Macintosh in
the 1980s. GUI contains interactive visual
components for computer software. It acts as an
interface between the user and the computer.
GUI Operating System is a graphics-based OS. It
uses icons, menus, and a mouse to interact easily
between the user and the system. A mouse is
generally used to select the icon or drop the menu.
Input Unit A computer will only respond when a We can perform GUI actions by directly
command is given to the device. These manipulating graphical elements like icons,
commands can be given using the input unit or menus, and buttons.
the input devices. Elements of GUI To create a user-friendly GUI,
Output Unit When we command a computer to the user can interact with the software using a
perform a task, it reverts for the action performed variety of elements.
and gives us a result. This result is called output.
Icon: A small graphic showing a file or program.
There are various output devices connected to the
computer. The most basic of which is a monitor. Button: When pressed, launches a program.
Memory Unit When we enter the data into the Menu: A list of options given to the user.
computer using an input device, the entered
information immediately gets saved in the Dialogue Box: Asks a user for input and shows
memory unit of the Central Processing Unit additional data.
(CPU). Because of the presence of some existing Tab: A window's top clickable region displays a
programming, the Memory Unit transmits the different page.
data further to the other parts of the CPU.
Toolbar: A row of buttons controls the operation,
Control Unit This is the core unit which manages typically located near the top of an app window.
the entire functioning of the computer device. It
is one of the most essential components of the Ribbon: An alternative to the file menu and
computer system. The Control Unit collects the toolbar that combines program-related actions.
data entered using the input unit, leads it on for Advantages of GUI Operating Systems
processing and once that is done, receives the A GUI OS can increase usability for the typical
output and presents it to the user. It can be said to user. A GUI operating system is more user-
the center of all processing actions taking place friendly than a text-based command-line
inside a computer device. interface like MS-DOS.The GUI features make
computer operations simple to use without any
Arithmetic & Logical Unit As the name suggests, prior experience with computers. It uses
all the mathematical calculations or arithmetic metaphors like drag-and-drop for file transfers
operations are performed in the Arithmetic and and simple icons, like a trash bin for deleted files.
Logical Unit of the CPU. It can also perform GUI programs are self-descriptive.
actions like a comparison of data and decision-
making actions. The ALU comprises circuits
using which addition, subtraction, multiplication,
Disadvantages of GUI Operating Systems
GUIs require a significant amount of system A worm can self-replicate without a host
resources, including processing power and program and typically spreads without any
memory. This can slow down system interaction from the malware authors.
performance, especially on older or less capable
machines. A Trojan horse is designed to appear as a
legitimate software program to gain access to a
MALWARE & COMPUTER SECURITY system. Once activated following installation,
Trojans can execute their malicious functions.
History of Malware
Spyware collects information and data on the
The term malware was first used by computer device and user, as well as observes the user's
scientist and security researcher Yisrael Radai in activity without their knowledge.
1990. However, malware existed long before this.
Ransomware infects a user's system and
One of the first known examples of malware was encrypts its data. Cybercriminals then demand a
the Creeper virus in 1971, which was created as ransom payment from the victim in exchange for
an experiment by BBN Technologies engineer decrypting the system's data.
Robert
A rootkit obtains administrator-level access to
Thomas. Creeper was designed to infect the victim's system. Once installed, the program
mainframes on ARPANET. gives threat actors root or privileged access to the
The concept of malware took root in the system.
technology industry, and examples of viruses and A backdoor virus or remote access Trojan (RAT)
worms began to appear on Apple and IBM PCs in secretly creates a backdoor into an infected
the early 1980s before becoming popularized computer system that enables threat actors to
following the introduction of the World Wide remotely access it without alerting the user or the
Web and the commercial internet in the 1990s. system's security programs.
Since then, malware and the security strategies to
prevent it -- have only grown more complex. Adware tracks a user's browser and download
history with the intent to display pop-up or banner
What is malware? advertisements that the user into making a
Malware, or malicious software, isany program purchase.
or file that is intentionally harmful to a computer, Keyloggers, also called system monitors, track
network or server. nearly everything a user does on their computer.
What does malware do? This includes emails, opened webpages,
programs and keystrokes.
Malware can infect networks and devices And is
designed to harm those devices,Networks and/or How do malware infections happen?
their users in some way. Malware authors use a variety of physical
Types of malware include computer viruses, andvirtual means to spread malware that
worms, Trojan horses, ransomware and infectsdevices and networks.
spyware. These malicious programs steal, How to detect malware
encrypt and delete sensitive data; alter or hijack
core computing functions and monitor end Users may be able to detect malware if they
users' computer activity. observe unusual activity such as a sudden loss of
disk space, unusually slow speeds, repeated
What are the different types of malware? crashes or freezes, or an increase in unwanted
A virus is the most common type of malware that internet activity and pop-up advertisements.
can execute itself and spread by infecting other Antivirus and antimalware software may be
programs or files. installed on a device to detect and remove
malware. These tools can provide real-time Protect From Unauthorized Access
protection or detect and remove malware by
executing routine system scans. Types of Computer Security